Description
DO NOT BID
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank...
Completion Status:
100%
Review
Review
Anonymous
I was struggling with this subject, and this helped me a ton!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Mastering Machine Learning A Step by Step Guide with MATLAB Exercises
In your submission, please list all team members. You should have a word/pdf document to directly answer questions. Submit ...
Mastering Machine Learning A Step by Step Guide with MATLAB Exercises
In your submission, please list all team members. You should have a word/pdf document to directly answer questions. Submit your Matlab code either as a .m or .mix file. A Step-by-Step guide is found in Machine-Learning-workflow-ebook.pdf, which is online (also under Files/Lecture material). Go over the document Download MATLAB code for the heart sounds classification application.After the download, you should have a folder having many files. The main file is the HeartSoundClassification.mlx. You need to understand the code step-by-step and see how classification is done and make changes to show your understanding and answer questions.In your submitted work, please answer the following questions:Plot the power spectral densities of two additional normal and abnormal PCG’s (the document has an example for each). Do all the three abnormal PCG’s show a clear spike near 0.2 radian?How many *.wav files are there in the data/training directory (need to use Matlab to count)? How many training files have abnormal and normal PCG’s? How many *.wav files are there in the data/validation directory (need to use Matlab to count)? How many *.wav validation files have abnormal and normal PCG’s? What is the size of the variable feature_table? Report the means and standard deviations of the 28 features for abnormal and normal PCG’s. By comparing the means, which features are likely most/least important for the classification.Run five classifiers using classificationLearner from at least three different groups (all models in Decision Trees are considered to be in the same group). You should have at least one classifier having an accuracy below 75% and one above 92%. Present the confusion matrices for each. Briefly explain the principle each classifer uses (in a few sentences).For your best model, reduce the false negative to less than 1% by modifying the cost function. In the Perform Feature Selection using Neighborhood Component Analysis section, what are the three most and least important features? Support your response with your own data.In the above, you do not change the feature_table. For the following tasks, remove the 12 least important features in the original feature_table, do the following:Rerun the same five classifiers using classificationLearner as you did before. Compare the confusion matrices with the previous runs. How do the accuracies compare?What are the three most and least important features in the new feature_table?
creating and then automating the backup process in both the Windows and Linux environments, programming homework help
I need the following completed. Very important I need the copy of the working scripts, screenshot with current date showin ...
creating and then automating the backup process in both the Windows and Linux environments, programming homework help
I need the following completed. Very important I need the copy of the working scripts, screenshot with current date showing, copy of Linux scripts, along with step 4. No plagiarism for the word doc please. I have attached the grading instruction-please follow. Thank you-Earlier in the course, you learned about Services. An often neglected but critical service is running backups. This project serves as a first step towards creating and then automating the backup process in both the Windows and Linux environments. This project requires that you use an existing install of Windows Server from Project 1 and Ubuntu Server from Project 2. You will include a reflective paper of at least 2 pages in current APA format that details the installations, configurations, challenges, and solutions to complete the following systems administration project: In the Windows server environment, you will create two separate scripts within PowerShell that will perform two types of backups of a given source directory and store the backed up files in a given target directory (preferably on a separate drive). The first script will perform a full backup and the second script will perform an incremental backup on the remaining days of the week. Lastly, using the Microsoft Management Console Task Scheduler, you will set up a schedule for the first script (the full backup script) to run on Sundays and Wednesdays and a schedule for the second script (the incremental backup script) to run on the remaining days of the week.Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the Task Scheduler interface showing the correctly scheduled tasks; and 3) results of the backup processes (specifically the files in both the source and target directories).In the Ubuntu environment, you will perform the same tasks as the last two steps. You will create two separate BASH scripts that will perform two types of backups of a given source directory and store the backed up files in a given target directory (preferably on a separate drive). The first script will perform a full backup and the second script will perform an incremental backup on the remaining days of the week. For assistance with this, Google “incremental backup script in bash” for starters. Once you have these scripts working, use the cron command to schedule the scripts. As the previous steps dictate, you will set up a schedule for the first script (the full backup script) to run on Sundays and Wednesdays and a schedule for the second script (the incremental backup script) to run on the remaining days of the week.Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the scheduled scripts using crontab or the contents of the /etc/cron.* directories showing the correctly scheduled tasks; and 3) results of the backup processes (specifically the files in both the source and target directories). The paper must use appendixes to reference screenshots along the way. Screenshots must identify a unique piece of information on the user’s computer such as a picture and include the system date and time in each screen capture. At the minimum, screenshots must exist during the initial setup of VirtualBox, installation of the operating system, configuration of the user accounts, security updates, and firewall configuration of the new operating systems. Subsequent screenshots must exist that detail the other deliverables in each phase (e.g., such as DNS).
IT Security question 3
In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in We ...
IT Security question 3
In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project. Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 2 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Use Track Changes or color code your changes and additions so that the changes are easy to identify. This week you will consider planning, implementing, and verifying a protected database for the organization. This involves restricting user access and permissions. You will also consider the mobile computers for the marketing department and how they should be secured for use.Using the South University Online Library or the Internet, research about the following:Planning and implementing security for mobile computers and mobile devicesPlanning and implementing a secure databaseVerification testing for security mechanisms that are in placeUsing the project report from W2 Assignment 2, complete the following tasks by adding 3- to 4-pages to your existing report:
Modify the report from W2 AssignmenProvide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.
IGlobal University Strassens Algorithm Programming Exercises
Assignment1. NOW Multiply the matrices below using Strassen's algorithm. Write EVERY step of your calculation. (40 points ...
IGlobal University Strassens Algorithm Programming Exercises
Assignment1. NOW Multiply the matrices below using Strassen's algorithm. Write EVERY step of your calculation. (40 points)Matrix A 1 3 3 2Matrix B 2 5 4 12. Sort the list below using LSD Radix sort. (30 points) 6347 62 1733 962 4188 1688 54 347 960 13473. Sort the list below using MSD Radix sort. (30 Points) 6347 62 1733 962 4188 1688 54 347 960 13474) Remember matrix multiplications? Multiply the matrices below. Write EVERY step of your calculation. Matrix A 1 3 3 2Matrix B 2 5 4 15) Sort the list below. Explain the how you sorted the list or the method use use to sort the list. 6347 62 1733 962 4188 1688 54 347 960 1347
Similar Content
COSC 2436 Houston Community College System Stack Program Project
Write a function that takes a string parameter and determines whether the string contains matching grouping symbols. Group...
Somerset Community College Program Accepts Child Care Data Worksheet
...
sequential data files, parameters, arguments, variables, functions
discuss the various ways to act on sequential files. also discuss how to set up a loop to read from a file.How do you se...
Application: Creating and Using a Microsoft Access Database, Part 1 and Part 2
Assignment Scenario Premise:Community Health and Wellness Clinic offers preventive and traditional medical care. In your r...
c programming questions
Task 1Write a program that reads two strings from the command line. The usershould have the possibility of:a) Concatenatin...
Styling the Declaration of Independence
This work will ask you to style an HTML version of the Declaration of Independence. I will provide you with the HTML file ...
Chapter 5 5.8 5.15 Implemented In C
5.8 we want to increase the number of registers that we can specify in the LC-3 ADD instruction to 32. Do you see any prob...
Report
The situation concerning the case study involves the product-service systems. The raised issue is that little study and fo...
Python Assignment7 1
1-Read and print the data from the brain.csv file 2-Extraxt the HeadSzie and the BrainWeight into separate arrays (print a...
Related Tags
Book Guides
Into the Wild
by Jon Krakauer
How to Win Friends and Influence People
by Dale Carnegie
Macbeth
by William Shakespeare
The Silent Patient
by Alex Michaelides
Unf*ck Yourself
by Gary John Bishop
The Chosen
by Chaim Potok
Moby Dick
by Herman Melville
Crippled America
by Donald J Trump
Killers of the Flower Moon
by David Grann
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Mastering Machine Learning A Step by Step Guide with MATLAB Exercises
In your submission, please list all team members. You should have a word/pdf document to directly answer questions. Submit ...
Mastering Machine Learning A Step by Step Guide with MATLAB Exercises
In your submission, please list all team members. You should have a word/pdf document to directly answer questions. Submit your Matlab code either as a .m or .mix file. A Step-by-Step guide is found in Machine-Learning-workflow-ebook.pdf, which is online (also under Files/Lecture material). Go over the document Download MATLAB code for the heart sounds classification application.After the download, you should have a folder having many files. The main file is the HeartSoundClassification.mlx. You need to understand the code step-by-step and see how classification is done and make changes to show your understanding and answer questions.In your submitted work, please answer the following questions:Plot the power spectral densities of two additional normal and abnormal PCG’s (the document has an example for each). Do all the three abnormal PCG’s show a clear spike near 0.2 radian?How many *.wav files are there in the data/training directory (need to use Matlab to count)? How many training files have abnormal and normal PCG’s? How many *.wav files are there in the data/validation directory (need to use Matlab to count)? How many *.wav validation files have abnormal and normal PCG’s? What is the size of the variable feature_table? Report the means and standard deviations of the 28 features for abnormal and normal PCG’s. By comparing the means, which features are likely most/least important for the classification.Run five classifiers using classificationLearner from at least three different groups (all models in Decision Trees are considered to be in the same group). You should have at least one classifier having an accuracy below 75% and one above 92%. Present the confusion matrices for each. Briefly explain the principle each classifer uses (in a few sentences).For your best model, reduce the false negative to less than 1% by modifying the cost function. In the Perform Feature Selection using Neighborhood Component Analysis section, what are the three most and least important features? Support your response with your own data.In the above, you do not change the feature_table. For the following tasks, remove the 12 least important features in the original feature_table, do the following:Rerun the same five classifiers using classificationLearner as you did before. Compare the confusion matrices with the previous runs. How do the accuracies compare?What are the three most and least important features in the new feature_table?
creating and then automating the backup process in both the Windows and Linux environments, programming homework help
I need the following completed. Very important I need the copy of the working scripts, screenshot with current date showin ...
creating and then automating the backup process in both the Windows and Linux environments, programming homework help
I need the following completed. Very important I need the copy of the working scripts, screenshot with current date showing, copy of Linux scripts, along with step 4. No plagiarism for the word doc please. I have attached the grading instruction-please follow. Thank you-Earlier in the course, you learned about Services. An often neglected but critical service is running backups. This project serves as a first step towards creating and then automating the backup process in both the Windows and Linux environments. This project requires that you use an existing install of Windows Server from Project 1 and Ubuntu Server from Project 2. You will include a reflective paper of at least 2 pages in current APA format that details the installations, configurations, challenges, and solutions to complete the following systems administration project: In the Windows server environment, you will create two separate scripts within PowerShell that will perform two types of backups of a given source directory and store the backed up files in a given target directory (preferably on a separate drive). The first script will perform a full backup and the second script will perform an incremental backup on the remaining days of the week. Lastly, using the Microsoft Management Console Task Scheduler, you will set up a schedule for the first script (the full backup script) to run on Sundays and Wednesdays and a schedule for the second script (the incremental backup script) to run on the remaining days of the week.Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the Task Scheduler interface showing the correctly scheduled tasks; and 3) results of the backup processes (specifically the files in both the source and target directories).In the Ubuntu environment, you will perform the same tasks as the last two steps. You will create two separate BASH scripts that will perform two types of backups of a given source directory and store the backed up files in a given target directory (preferably on a separate drive). The first script will perform a full backup and the second script will perform an incremental backup on the remaining days of the week. For assistance with this, Google “incremental backup script in bash” for starters. Once you have these scripts working, use the cron command to schedule the scripts. As the previous steps dictate, you will set up a schedule for the first script (the full backup script) to run on Sundays and Wednesdays and a schedule for the second script (the incremental backup script) to run on the remaining days of the week.Provide three pieces of evidence showing that your scripts were successful: 1) a copy of your scripts; 2) clear screenshots of the scheduled scripts using crontab or the contents of the /etc/cron.* directories showing the correctly scheduled tasks; and 3) results of the backup processes (specifically the files in both the source and target directories). The paper must use appendixes to reference screenshots along the way. Screenshots must identify a unique piece of information on the user’s computer such as a picture and include the system date and time in each screen capture. At the minimum, screenshots must exist during the initial setup of VirtualBox, installation of the operating system, configuration of the user accounts, security updates, and firewall configuration of the new operating systems. Subsequent screenshots must exist that detail the other deliverables in each phase (e.g., such as DNS).
IT Security question 3
In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in We ...
IT Security question 3
In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project. Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 2 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Use Track Changes or color code your changes and additions so that the changes are easy to identify. This week you will consider planning, implementing, and verifying a protected database for the organization. This involves restricting user access and permissions. You will also consider the mobile computers for the marketing department and how they should be secured for use.Using the South University Online Library or the Internet, research about the following:Planning and implementing security for mobile computers and mobile devicesPlanning and implementing a secure databaseVerification testing for security mechanisms that are in placeUsing the project report from W2 Assignment 2, complete the following tasks by adding 3- to 4-pages to your existing report:
Modify the report from W2 AssignmenProvide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.
IGlobal University Strassens Algorithm Programming Exercises
Assignment1. NOW Multiply the matrices below using Strassen's algorithm. Write EVERY step of your calculation. (40 points ...
IGlobal University Strassens Algorithm Programming Exercises
Assignment1. NOW Multiply the matrices below using Strassen's algorithm. Write EVERY step of your calculation. (40 points)Matrix A 1 3 3 2Matrix B 2 5 4 12. Sort the list below using LSD Radix sort. (30 points) 6347 62 1733 962 4188 1688 54 347 960 13473. Sort the list below using MSD Radix sort. (30 Points) 6347 62 1733 962 4188 1688 54 347 960 13474) Remember matrix multiplications? Multiply the matrices below. Write EVERY step of your calculation. Matrix A 1 3 3 2Matrix B 2 5 4 15) Sort the list below. Explain the how you sorted the list or the method use use to sort the list. 6347 62 1733 962 4188 1688 54 347 960 1347
Earn money selling
your Study Documents